oci-vnmonitoring 2.76.1 → 2.77.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/client.d.ts +19 -13
- package/lib/client.js +21 -12
- package/lib/client.js.map +1 -1
- package/lib/model/add-drg-route-rule-details.d.ts +3 -3
- package/lib/model/add-public-ip-pool-capacity-details.d.ts +3 -3
- package/lib/model/add-security-rule-details.d.ts +21 -21
- package/lib/model/add-subnet-ipv6-cidr-details.d.ts +1 -1
- package/lib/model/add-vcn-ipv6-cidr-details.d.ts +1 -1
- package/lib/model/bgp-session-info.d.ts +15 -15
- package/lib/model/byoip-allocated-range-collection.d.ts +1 -1
- package/lib/model/byoip-range-collection.d.ts +2 -2
- package/lib/model/byoip-range-summary.d.ts +9 -9
- package/lib/model/byoip-range-vcn-ipv6-allocation-summary.d.ts +3 -3
- package/lib/model/byoip-range.d.ts +15 -15
- package/lib/model/byoipv6-cidr-details.d.ts +3 -3
- package/lib/model/capture-filter.d.ts +3 -3
- package/lib/model/change-path-analyzer-test-compartment-details.d.ts +2 -2
- package/lib/model/compute-instance-endpoint.d.ts +2 -2
- package/lib/model/connect-remote-peering-connections-details.d.ts +1 -1
- package/lib/model/cpe-device-config-answer.d.ts +2 -2
- package/lib/model/cpe.d.ts +5 -5
- package/lib/model/create-byoip-range-details.d.ts +4 -4
- package/lib/model/create-capture-filter-details.d.ts +2 -2
- package/lib/model/create-cpe-details.d.ts +4 -4
- package/lib/model/create-cross-connect-details.d.ts +4 -4
- package/lib/model/create-cross-connect-group-details.d.ts +2 -2
- package/lib/model/create-dhcp-details.d.ts +2 -2
- package/lib/model/create-drg-attachment-details.d.ts +3 -3
- package/lib/model/create-drg-details.d.ts +2 -2
- package/lib/model/create-drg-route-distribution-details.d.ts +2 -2
- package/lib/model/create-drg-route-table-details.d.ts +2 -2
- package/lib/model/create-internet-gateway-details.d.ts +2 -2
- package/lib/model/create-ip-sec-connection-details.d.ts +12 -12
- package/lib/model/create-ip-sec-connection-tunnel-details.d.ts +3 -3
- package/lib/model/create-ip-sec-tunnel-bgp-session-details.d.ts +15 -15
- package/lib/model/create-ipv6-details.d.ts +4 -4
- package/lib/model/create-local-peering-gateway-details.d.ts +2 -2
- package/lib/model/create-nat-gateway-details.d.ts +4 -4
- package/lib/model/create-network-security-group-details.d.ts +2 -2
- package/lib/model/create-path-analyzer-test-details.d.ts +5 -5
- package/lib/model/create-private-ip-details.d.ts +5 -5
- package/lib/model/create-public-ip-details.d.ts +2 -2
- package/lib/model/create-public-ip-pool-details.d.ts +2 -2
- package/lib/model/create-remote-peering-connection-details.d.ts +2 -2
- package/lib/model/create-route-table-details.d.ts +2 -2
- package/lib/model/create-security-list-details.d.ts +2 -2
- package/lib/model/create-service-gateway-details.d.ts +4 -4
- package/lib/model/create-subnet-details.d.ts +14 -14
- package/lib/model/create-vcn-details.d.ts +11 -11
- package/lib/model/create-virtual-circuit-details.d.ts +13 -13
- package/lib/model/create-vlan-details.d.ts +4 -4
- package/lib/model/create-vnic-details.d.ts +24 -24
- package/lib/model/create-vtap-details.d.ts +7 -7
- package/lib/model/cross-connect-group.d.ts +4 -4
- package/lib/model/cross-connect-location.d.ts +1 -1
- package/lib/model/cross-connect-mapping-details.d.ts +6 -6
- package/lib/model/cross-connect-mapping.d.ts +7 -7
- package/lib/model/cross-connect-port-speed-shape.d.ts +2 -2
- package/lib/model/cross-connect-status.d.ts +2 -2
- package/lib/model/cross-connect.d.ts +5 -5
- package/lib/model/dhcp-dns-option.d.ts +1 -1
- package/lib/model/dhcp-options.d.ts +3 -3
- package/lib/model/dhcp-search-domain-option.d.ts +2 -2
- package/lib/model/drg-attachment-info.d.ts +1 -1
- package/lib/model/drg-attachment.d.ts +6 -6
- package/lib/model/drg-route-distribution-statement.d.ts +1 -1
- package/lib/model/drg-route-distribution.d.ts +4 -4
- package/lib/model/drg-route-rule.d.ts +10 -10
- package/lib/model/drg-route-table.d.ts +4 -4
- package/lib/model/drg.d.ts +3 -3
- package/lib/model/egress-security-rule.d.ts +9 -9
- package/lib/model/endpoint.d.ts +1 -1
- package/lib/model/fast-connect-provider-service-key.d.ts +2 -2
- package/lib/model/fast-connect-provider-service.d.ts +1 -1
- package/lib/model/flow-log-capture-filter-rule-details.d.ts +1 -1
- package/lib/model/i-psec-connection-device-status.d.ts +1 -1
- package/lib/model/i-psec-connection-tunnel.d.ts +7 -7
- package/lib/model/i-psec-connection.d.ts +14 -14
- package/lib/model/icmp-traffic-protocol-parameters.d.ts +1 -1
- package/lib/model/ingress-security-rule.d.ts +9 -9
- package/lib/model/internet-gateway.d.ts +3 -3
- package/lib/model/ip-address-endpoint.d.ts +2 -2
- package/lib/model/ipv6.d.ts +7 -7
- package/lib/model/letter-of-authority.d.ts +1 -1
- package/lib/model/load-balancer-endpoint.d.ts +1 -1
- package/lib/model/load-balancer-listener-endpoint.d.ts +1 -1
- package/lib/model/local-peering-gateway.d.ts +11 -11
- package/lib/model/macsec-key.d.ts +1 -1
- package/lib/model/nat-gateway.d.ts +5 -5
- package/lib/model/network-load-balancer-endpoint.d.ts +1 -1
- package/lib/model/network-load-balancer-listener-endpoint.d.ts +1 -1
- package/lib/model/network-security-group-vnic.d.ts +1 -1
- package/lib/model/network-security-group.d.ts +3 -3
- package/lib/model/path-analysis-work-request-result.d.ts +2 -2
- package/lib/model/path-analyzer-test-collection.d.ts +2 -2
- package/lib/model/path-analyzer-test-summary.d.ts +9 -9
- package/lib/model/path-analyzer-test.d.ts +9 -9
- package/lib/model/path.d.ts +1 -1
- package/lib/model/persisted-get-path-analysis-details.d.ts +2 -2
- package/lib/model/private-ip.d.ts +21 -21
- package/lib/model/protocol-parameters.d.ts +1 -1
- package/lib/model/public-ip-pool-collection.d.ts +1 -1
- package/lib/model/public-ip-pool-summary.d.ts +3 -3
- package/lib/model/public-ip-pool.d.ts +3 -3
- package/lib/model/public-ip.d.ts +17 -17
- package/lib/model/query-options.d.ts +1 -1
- package/lib/model/remote-peering-connection.d.ts +7 -7
- package/lib/model/remove-public-ip-pool-capacity-details.d.ts +1 -1
- package/lib/model/remove-subnet-ipv6-cidr-details.d.ts +1 -1
- package/lib/model/remove-vcn-ipv6-cidr-details.d.ts +1 -1
- package/lib/model/route-rule.d.ts +13 -13
- package/lib/model/route-table.d.ts +4 -4
- package/lib/model/security-action.d.ts +1 -1
- package/lib/model/security-list.d.ts +3 -3
- package/lib/model/security-rule.d.ts +26 -26
- package/lib/model/service-gateway.d.ts +7 -7
- package/lib/model/service.d.ts +10 -10
- package/lib/model/subnet-endpoint.d.ts +2 -2
- package/lib/model/subnet.d.ts +21 -21
- package/lib/model/tcp-protocol-parameters.d.ts +2 -2
- package/lib/model/tcp-traffic-protocol-parameters.d.ts +3 -3
- package/lib/model/topology-associated-with-entity-relationship.d.ts +2 -2
- package/lib/model/topology-associated-with-relationship-details.d.ts +1 -1
- package/lib/model/topology-contains-entity-relationship.d.ts +2 -2
- package/lib/model/topology-routes-to-entity-relationship.d.ts +1 -1
- package/lib/model/topology-routes-to-relationship-details.d.ts +5 -5
- package/lib/model/topology.d.ts +1 -1
- package/lib/model/traffic-node.d.ts +1 -1
- package/lib/model/traffic-protocol-parameters.d.ts +1 -1
- package/lib/model/traffic-route.d.ts +1 -1
- package/lib/model/tunnel-config.d.ts +2 -2
- package/lib/model/tunnel-cpe-device-config.d.ts +1 -1
- package/lib/model/tunnel-phase-one-details.d.ts +1 -1
- package/lib/model/tunnel-phase-two-details.d.ts +1 -1
- package/lib/model/tunnel-security-association-summary.d.ts +1 -1
- package/lib/model/tunnel-status.d.ts +3 -3
- package/lib/model/udp-protocol-parameters.d.ts +2 -2
- package/lib/model/udp-traffic-protocol-parameters.d.ts +3 -3
- package/lib/model/update-byoip-range-details.d.ts +3 -3
- package/lib/model/update-capture-filter-details.d.ts +2 -2
- package/lib/model/update-cpe-details.d.ts +2 -2
- package/lib/model/update-cross-connect-details.d.ts +3 -3
- package/lib/model/update-cross-connect-group-details.d.ts +2 -2
- package/lib/model/update-dhcp-details.d.ts +2 -2
- package/lib/model/update-drg-attachment-details.d.ts +2 -2
- package/lib/model/update-drg-details.d.ts +2 -2
- package/lib/model/update-drg-route-distribution-details.d.ts +2 -2
- package/lib/model/update-drg-route-rule-details.d.ts +3 -3
- package/lib/model/update-drg-route-table-details.d.ts +2 -2
- package/lib/model/update-internet-gateway-details.d.ts +2 -2
- package/lib/model/update-ip-sec-connection-details.d.ts +8 -8
- package/lib/model/update-ip-sec-connection-tunnel-details.d.ts +3 -3
- package/lib/model/update-ip-sec-tunnel-bgp-session-details.d.ts +16 -16
- package/lib/model/update-ipv6-details.d.ts +2 -2
- package/lib/model/update-local-peering-gateway-details.d.ts +2 -2
- package/lib/model/update-nat-gateway-details.d.ts +4 -4
- package/lib/model/update-network-security-group-details.d.ts +2 -2
- package/lib/model/update-path-analyzer-test-details.d.ts +4 -4
- package/lib/model/update-private-ip-details.d.ts +4 -4
- package/lib/model/update-public-ip-details.d.ts +2 -2
- package/lib/model/update-public-ip-pool-details.d.ts +2 -2
- package/lib/model/update-remote-peering-connection-details.d.ts +2 -2
- package/lib/model/update-route-table-details.d.ts +2 -2
- package/lib/model/update-security-list-details.d.ts +2 -2
- package/lib/model/update-security-rule-details.d.ts +23 -23
- package/lib/model/update-service-gateway-details.d.ts +8 -8
- package/lib/model/update-subnet-details.d.ts +5 -5
- package/lib/model/update-vcn-details.d.ts +2 -2
- package/lib/model/update-virtual-circuit-details.d.ts +7 -7
- package/lib/model/update-vlan-details.d.ts +3 -3
- package/lib/model/update-vnic-details.d.ts +7 -7
- package/lib/model/update-vtap-details.d.ts +5 -5
- package/lib/model/upgrade-status.d.ts +1 -1
- package/lib/model/vcn.d.ts +8 -8
- package/lib/model/virtual-circuit-bandwidth-shape.d.ts +2 -2
- package/lib/model/virtual-circuit-drg-attachment-network-details.d.ts +1 -1
- package/lib/model/virtual-circuit-public-prefix.d.ts +2 -2
- package/lib/model/virtual-circuit.d.ts +11 -11
- package/lib/model/vlan-endpoint.d.ts +2 -2
- package/lib/model/vlan.d.ts +6 -6
- package/lib/model/vnic-endpoint.d.ts +2 -2
- package/lib/model/vnic.d.ts +16 -16
- package/lib/model/vtap.d.ts +8 -8
- package/lib/model/work-request-error-collection.d.ts +2 -2
- package/lib/model/work-request-log-entry-collection.d.ts +1 -1
- package/lib/model/work-request-resource.d.ts +3 -3
- package/lib/model/work-request-result-collection.d.ts +2 -2
- package/lib/model/work-request-summary-collection.d.ts +2 -2
- package/lib/model/work-request-summary.d.ts +2 -2
- package/lib/model/work-request.d.ts +2 -2
- package/lib/request/change-path-analyzer-test-compartment-request.d.ts +3 -3
- package/lib/request/create-path-analyzer-test-request.d.ts +1 -1
- package/lib/request/delete-path-analyzer-test-request.d.ts +3 -3
- package/lib/request/get-path-analysis-request.d.ts +1 -1
- package/lib/request/get-path-analyzer-test-request.d.ts +2 -2
- package/lib/request/get-work-request-request.d.ts +1 -1
- package/lib/request/list-path-analyzer-tests-request.d.ts +7 -7
- package/lib/request/list-work-request-errors-request.d.ts +5 -5
- package/lib/request/list-work-request-logs-request.d.ts +5 -5
- package/lib/request/list-work-request-results-request.d.ts +3 -3
- package/lib/request/list-work-requests-request.d.ts +6 -6
- package/lib/request/update-path-analyzer-test-request.d.ts +3 -3
- package/lib/response/change-path-analyzer-test-compartment-response.d.ts +1 -1
- package/lib/response/create-path-analyzer-test-response.d.ts +1 -1
- package/lib/response/get-path-analyzer-test-response.d.ts +1 -1
- package/lib/response/get-work-request-response.d.ts +1 -1
- package/lib/response/list-path-analyzer-tests-response.d.ts +1 -1
- package/lib/response/list-work-request-errors-response.d.ts +1 -1
- package/lib/response/list-work-request-logs-response.d.ts +1 -1
- package/lib/response/list-work-request-results-response.d.ts +1 -1
- package/lib/response/list-work-requests-response.d.ts +1 -1
- package/lib/response/update-path-analyzer-test-response.d.ts +1 -1
- package/package.json +3 -3
|
@@ -18,7 +18,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
18
18
|
export interface UpdatePublicIpPoolDetails {
|
|
19
19
|
/**
|
|
20
20
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
21
|
-
* Example:
|
|
21
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
22
22
|
*
|
|
23
23
|
*/
|
|
24
24
|
"definedTags"?: {
|
|
@@ -34,7 +34,7 @@ export interface UpdatePublicIpPoolDetails {
|
|
|
34
34
|
"displayName"?: string;
|
|
35
35
|
/**
|
|
36
36
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
37
|
-
* Example:
|
|
37
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
38
38
|
*
|
|
39
39
|
*/
|
|
40
40
|
"freeformTags"?: {
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateRemotePeeringConnectionDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateRemotePeeringConnectionDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -16,7 +16,7 @@ import * as model from "../model";
|
|
|
16
16
|
export interface UpdateRouteTableDetails {
|
|
17
17
|
/**
|
|
18
18
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
19
|
-
* Example:
|
|
19
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
20
20
|
*
|
|
21
21
|
*/
|
|
22
22
|
"definedTags"?: {
|
|
@@ -32,7 +32,7 @@ export interface UpdateRouteTableDetails {
|
|
|
32
32
|
"displayName"?: string;
|
|
33
33
|
/**
|
|
34
34
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
35
|
-
* Example:
|
|
35
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
36
36
|
*
|
|
37
37
|
*/
|
|
38
38
|
"freeformTags"?: {
|
|
@@ -16,7 +16,7 @@ import * as model from "../model";
|
|
|
16
16
|
export interface UpdateSecurityListDetails {
|
|
17
17
|
/**
|
|
18
18
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
19
|
-
* Example:
|
|
19
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
20
20
|
*
|
|
21
21
|
*/
|
|
22
22
|
"definedTags"?: {
|
|
@@ -36,7 +36,7 @@ export interface UpdateSecurityListDetails {
|
|
|
36
36
|
"egressSecurityRules"?: Array<model.EgressSecurityRule>;
|
|
37
37
|
/**
|
|
38
38
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
39
|
-
* Example:
|
|
39
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
40
40
|
*
|
|
41
41
|
*/
|
|
42
42
|
"freeformTags"?: {
|
|
@@ -14,7 +14,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
14
14
|
*/
|
|
15
15
|
import * as model from "../model";
|
|
16
16
|
/**
|
|
17
|
-
* A rule for allowing inbound (
|
|
17
|
+
* A rule for allowing inbound ({@code direction}= INGRESS) or outbound ({@code direction}= EGRESS) IP packets.
|
|
18
18
|
*
|
|
19
19
|
*/
|
|
20
20
|
export interface UpdateSecurityRuleDetails {
|
|
@@ -29,13 +29,13 @@ export interface UpdateSecurityRuleDetails {
|
|
|
29
29
|
* <p>
|
|
30
30
|
Allowed values:
|
|
31
31
|
* <p>
|
|
32
|
-
* An IP address range in CIDR notation. For example:
|
|
32
|
+
* An IP address range in CIDR notation. For example: {@code 192.168.1.0/24} or {@code 2001:0db8:0123:45::/56}
|
|
33
33
|
* IPv6 addressing is supported for all commercial and government regions. See
|
|
34
34
|
* [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
|
|
35
35
|
* <p>
|
|
36
|
-
* The
|
|
37
|
-
* setting up a security rule for traffic destined for a particular
|
|
38
|
-
* a service gateway. For example:
|
|
36
|
+
* The {@code cidrBlock} value for a {@link Service}, if you're
|
|
37
|
+
* setting up a security rule for traffic destined for a particular {@code Service} through
|
|
38
|
+
* a service gateway. For example: {@code oci-phx-objectstorage}.
|
|
39
39
|
* <p>
|
|
40
40
|
* The [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a {@link NetworkSecurityGroup} in the same
|
|
41
41
|
* VCN. The value can be the NSG that the rule belongs to if the rule's intent is to control
|
|
@@ -44,24 +44,24 @@ export interface UpdateSecurityRuleDetails {
|
|
|
44
44
|
*/
|
|
45
45
|
"destination"?: string;
|
|
46
46
|
/**
|
|
47
|
-
* Type of destination for the rule. Required if
|
|
47
|
+
* Type of destination for the rule. Required if {@code direction} = {@code EGRESS}.
|
|
48
48
|
* <p>
|
|
49
49
|
Allowed values:
|
|
50
50
|
* <p>
|
|
51
|
-
*
|
|
51
|
+
* {@code CIDR_BLOCK}: If the rule's {@code destination} is an IP address range in CIDR notation.
|
|
52
52
|
* <p>
|
|
53
|
-
*
|
|
53
|
+
* {@code SERVICE_CIDR_BLOCK}: If the rule's {@code destination} is the {@code cidrBlock} value for a
|
|
54
54
|
* {@link Service} (the rule is for traffic destined for a
|
|
55
|
-
* particular
|
|
55
|
+
* particular {@code Service} through a service gateway).
|
|
56
56
|
* <p>
|
|
57
|
-
*
|
|
57
|
+
* {@code NETWORK_SECURITY_GROUP}: If the rule's {@code destination} is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
|
|
58
58
|
* {@link NetworkSecurityGroup}.
|
|
59
59
|
*
|
|
60
60
|
*/
|
|
61
61
|
"destinationType"?: UpdateSecurityRuleDetails.DestinationType;
|
|
62
62
|
/**
|
|
63
|
-
* Direction of the security rule. Set to
|
|
64
|
-
* or
|
|
63
|
+
* Direction of the security rule. Set to {@code EGRESS} for rules to allow outbound IP packets,
|
|
64
|
+
* or {@code INGRESS} for rules to allow inbound IP packets.
|
|
65
65
|
*
|
|
66
66
|
*/
|
|
67
67
|
"direction": UpdateSecurityRuleDetails.Direction;
|
|
@@ -69,7 +69,7 @@ export interface UpdateSecurityRuleDetails {
|
|
|
69
69
|
/**
|
|
70
70
|
* The Oracle-assigned ID of the security rule that you want to update. You can't change this value.
|
|
71
71
|
* <p>
|
|
72
|
-
Example:
|
|
72
|
+
Example: {@code 04ABEC}
|
|
73
73
|
*
|
|
74
74
|
*/
|
|
75
75
|
"id": string;
|
|
@@ -83,7 +83,7 @@ export interface UpdateSecurityRuleDetails {
|
|
|
83
83
|
*/
|
|
84
84
|
"isStateless"?: boolean;
|
|
85
85
|
/**
|
|
86
|
-
* The transport protocol. Specify either
|
|
86
|
+
* The transport protocol. Specify either {@code all} or an IPv4 protocol number as
|
|
87
87
|
* defined in
|
|
88
88
|
* [Protocol Numbers](http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml).
|
|
89
89
|
* Options are supported only for ICMP (\"1\"), TCP (\"6\"), UDP (\"17\"), and ICMPv6 (\"58\").
|
|
@@ -96,13 +96,13 @@ export interface UpdateSecurityRuleDetails {
|
|
|
96
96
|
* <p>
|
|
97
97
|
Allowed values:
|
|
98
98
|
* <p>
|
|
99
|
-
* An IP address range in CIDR notation. For example:
|
|
99
|
+
* An IP address range in CIDR notation. For example: {@code 192.168.1.0/24} or {@code 2001:0db8:0123:45::/56}
|
|
100
100
|
* IPv6 addressing is supported for all commercial and government regions. See
|
|
101
101
|
* [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
|
|
102
102
|
* <p>
|
|
103
|
-
* The
|
|
104
|
-
* setting up a security rule for traffic coming from a particular
|
|
105
|
-
* a service gateway. For example:
|
|
103
|
+
* The {@code cidrBlock} value for a {@link Service}, if you're
|
|
104
|
+
* setting up a security rule for traffic coming from a particular {@code Service} through
|
|
105
|
+
* a service gateway. For example: {@code oci-phx-objectstorage}.
|
|
106
106
|
* <p>
|
|
107
107
|
* The [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a {@link NetworkSecurityGroup} in the same
|
|
108
108
|
* VCN. The value can be the NSG that the rule belongs to if the rule's intent is to control
|
|
@@ -111,15 +111,15 @@ export interface UpdateSecurityRuleDetails {
|
|
|
111
111
|
*/
|
|
112
112
|
"source"?: string;
|
|
113
113
|
/**
|
|
114
|
-
* Type of source for the rule. Required if
|
|
114
|
+
* Type of source for the rule. Required if {@code direction} = {@code INGRESS}.
|
|
115
115
|
* <p>
|
|
116
|
-
*
|
|
116
|
+
* {@code CIDR_BLOCK}: If the rule's {@code source} is an IP address range in CIDR notation.
|
|
117
117
|
* <p>
|
|
118
|
-
*
|
|
118
|
+
* {@code SERVICE_CIDR_BLOCK}: If the rule's {@code source} is the {@code cidrBlock} value for a
|
|
119
119
|
* {@link Service} (the rule is for traffic coming from a
|
|
120
|
-
* particular
|
|
120
|
+
* particular {@code Service} through a service gateway).
|
|
121
121
|
* <p>
|
|
122
|
-
*
|
|
122
|
+
* {@code NETWORK_SECURITY_GROUP}: If the rule's {@code source} is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
|
|
123
123
|
* {@link NetworkSecurityGroup}.
|
|
124
124
|
*
|
|
125
125
|
*/
|
|
@@ -15,16 +15,16 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
import * as model from "../model";
|
|
16
16
|
export interface UpdateServiceGatewayDetails {
|
|
17
17
|
/**
|
|
18
|
-
* Whether the service gateway blocks all traffic through it. The default is
|
|
19
|
-
* this is
|
|
18
|
+
* Whether the service gateway blocks all traffic through it. The default is {@code false}. When
|
|
19
|
+
* this is {@code true}, traffic is not routed to any services, regardless of route rules.
|
|
20
20
|
* <p>
|
|
21
|
-
Example:
|
|
21
|
+
Example: {@code true}
|
|
22
22
|
*
|
|
23
23
|
*/
|
|
24
24
|
"blockTraffic"?: boolean;
|
|
25
25
|
/**
|
|
26
26
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
27
|
-
* Example:
|
|
27
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
28
28
|
*
|
|
29
29
|
*/
|
|
30
30
|
"definedTags"?: {
|
|
@@ -40,7 +40,7 @@ export interface UpdateServiceGatewayDetails {
|
|
|
40
40
|
"displayName"?: string;
|
|
41
41
|
/**
|
|
42
42
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
43
|
-
* Example:
|
|
43
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
44
44
|
*
|
|
45
45
|
*/
|
|
46
46
|
"freeformTags"?: {
|
|
@@ -54,15 +54,15 @@ export interface UpdateServiceGatewayDetails {
|
|
|
54
54
|
*/
|
|
55
55
|
"routeTableId"?: string;
|
|
56
56
|
/**
|
|
57
|
-
* List of all the
|
|
57
|
+
* List of all the {@code Service} objects you want enabled on this service gateway. Sending an empty list
|
|
58
58
|
* means you want to disable all services. Omitting this parameter entirely keeps the
|
|
59
59
|
* existing list of services intact.
|
|
60
60
|
* <p>
|
|
61
|
-
You can also enable or disable a particular
|
|
61
|
+
You can also enable or disable a particular {@code Service} by using
|
|
62
62
|
* {@link #attachServiceId(AttachServiceIdRequest) attachServiceId} or
|
|
63
63
|
* {@link #detachServiceId(DetachServiceIdRequest) detachServiceId}.
|
|
64
64
|
* <p>
|
|
65
|
-
For each enabled
|
|
65
|
+
For each enabled {@code Service}, make sure there's a route rule with the {@code Service} object's {@code cidrBlock}
|
|
66
66
|
* as the rule's destination and the service gateway as the rule's target. See
|
|
67
67
|
* {@link RouteTable}.
|
|
68
68
|
*
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateSubnetDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -36,7 +36,7 @@ export interface UpdateSubnetDetails {
|
|
|
36
36
|
"displayName"?: string;
|
|
37
37
|
/**
|
|
38
38
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
39
|
-
* Example:
|
|
39
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
40
40
|
*
|
|
41
41
|
*/
|
|
42
42
|
"freeformTags"?: {
|
|
@@ -60,13 +60,13 @@ export interface UpdateSubnetDetails {
|
|
|
60
60
|
* <p>
|
|
61
61
|
- Must be valid.
|
|
62
62
|
* - The CIDR block's IP range must be completely within one of the VCN's CIDR block ranges.
|
|
63
|
-
* - The old and new CIDR block ranges must use the same network address. Example:
|
|
63
|
+
* - The old and new CIDR block ranges must use the same network address. Example: {@code 10.0.0.0/25} and {@code 10.0.0.0/24}.
|
|
64
64
|
* - Must contain all IP addresses in use in the old CIDR range.
|
|
65
65
|
* - The new CIDR range's broadcast address (last IP address of CIDR range) must not be an IP address in use in the old CIDR range.
|
|
66
66
|
* <p>
|
|
67
67
|
**Note:** If you are changing the CIDR block, you cannot create VNICs or private IPs for this resource while the update is in progress.
|
|
68
68
|
* <p>
|
|
69
|
-
Example:
|
|
69
|
+
Example: {@code 172.16.0.0/16}
|
|
70
70
|
*
|
|
71
71
|
*/
|
|
72
72
|
"cidrBlock"?: string;
|
|
@@ -79,7 +79,7 @@ export interface UpdateSubnetDetails {
|
|
|
79
79
|
a. The IPv6 CIDR block is valid and correctly formatted.
|
|
80
80
|
* b. The IPv6 CIDR is within the parent VCN IPv6 range.
|
|
81
81
|
* <p>
|
|
82
|
-
Example:
|
|
82
|
+
Example: {@code 2001:0db8:0123:1111::/64}
|
|
83
83
|
*
|
|
84
84
|
*/
|
|
85
85
|
"ipv6CidrBlock"?: string;
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateVcnDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateVcnDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -34,29 +34,29 @@ export interface UpdateVirtualCircuitDetails {
|
|
|
34
34
|
"crossConnectMappings"?: Array<model.CrossConnectMapping>;
|
|
35
35
|
/**
|
|
36
36
|
* The routing policy sets how routing information about the Oracle cloud is shared over a public virtual circuit.
|
|
37
|
-
* Policies available are:
|
|
37
|
+
* Policies available are: {@code ORACLE_SERVICE_NETWORK}, {@code REGIONAL}, {@code MARKET_LEVEL}, and {@code GLOBAL}.
|
|
38
38
|
* See [Route Filtering](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/routingonprem.htm#route_filtering) for details.
|
|
39
39
|
* By default, routing information is shared for all routes in the same market.
|
|
40
40
|
*
|
|
41
41
|
*/
|
|
42
42
|
"routingPolicy"?: Array<UpdateVirtualCircuitDetails.RoutingPolicy>;
|
|
43
43
|
/**
|
|
44
|
-
* Set to
|
|
44
|
+
* Set to {@code ENABLED} (the default) to activate the BGP session of the virtual circuit, set to {@code DISABLED} to deactivate the virtual circuit.
|
|
45
45
|
*
|
|
46
46
|
*/
|
|
47
47
|
"bgpAdminState"?: UpdateVirtualCircuitDetails.BgpAdminState;
|
|
48
48
|
/**
|
|
49
|
-
* Set to
|
|
49
|
+
* Set to {@code true} to enable BFD for IPv4 BGP peering, or set to {@code false} to disable BFD. If this is not set, the default is {@code false}.
|
|
50
50
|
*
|
|
51
51
|
*/
|
|
52
52
|
"isBfdEnabled"?: boolean;
|
|
53
53
|
/**
|
|
54
|
-
* Set to
|
|
54
|
+
* Set to {@code true} for the virtual circuit to carry only encrypted traffic, or set to {@code false} for the virtual circuit to carry unencrypted traffic. If this is not set, the default is {@code false}.
|
|
55
55
|
*
|
|
56
56
|
*/
|
|
57
57
|
"isTransportMode"?: boolean;
|
|
58
58
|
/**
|
|
59
|
-
* Deprecated. Instead use
|
|
59
|
+
* Deprecated. Instead use {@code customerAsn}.
|
|
60
60
|
* If you specify values for both, the request will be rejected.
|
|
61
61
|
* Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
|
|
62
62
|
*/
|
|
@@ -79,7 +79,7 @@ export interface UpdateVirtualCircuitDetails {
|
|
|
79
79
|
"customerAsn"?: number;
|
|
80
80
|
/**
|
|
81
81
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
82
|
-
* Example:
|
|
82
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
83
83
|
*
|
|
84
84
|
*/
|
|
85
85
|
"definedTags"?: {
|
|
@@ -95,7 +95,7 @@ export interface UpdateVirtualCircuitDetails {
|
|
|
95
95
|
"displayName"?: string;
|
|
96
96
|
/**
|
|
97
97
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
98
|
-
* Example:
|
|
98
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
99
99
|
*
|
|
100
100
|
*/
|
|
101
101
|
"freeformTags"?: {
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateVlanDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateVlanDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -55,7 +55,7 @@ export interface UpdateVlanDetails {
|
|
|
55
55
|
* <p>
|
|
56
56
|
- Must be valid.
|
|
57
57
|
* - The CIDR block's IP range must be completely within one of the VCN's CIDR block ranges.
|
|
58
|
-
* - The old and new CIDR block ranges must use the same network address. Example:
|
|
58
|
+
* - The old and new CIDR block ranges must use the same network address. Example: {@code 10.0.0.0/25} and {@code 10.0.0.0/24}.
|
|
59
59
|
* - Must contain all IP addresses in use in the old CIDR range.
|
|
60
60
|
* - The new CIDR range's broadcast address (last IP address of CIDR range) must not be an IP address in use in the old CIDR range.
|
|
61
61
|
* <p>
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateVnicDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateVnicDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -40,7 +40,7 @@ export interface UpdateVnicDetails {
|
|
|
40
40
|
/**
|
|
41
41
|
* The hostname for the VNIC's primary private IP. Used for DNS. The value is the hostname
|
|
42
42
|
* portion of the primary private IP's fully qualified domain name (FQDN)
|
|
43
|
-
* (for example,
|
|
43
|
+
* (for example, {@code bminstance1} in FQDN {@code bminstance1.subnet123.vcn1.oraclevcn.com}).
|
|
44
44
|
* Must be unique across all VNICs in the subnet and comply with
|
|
45
45
|
* [RFC 952](https://tools.ietf.org/html/rfc952) and
|
|
46
46
|
* [RFC 1123](https://tools.ietf.org/html/rfc1123).
|
|
@@ -59,7 +59,7 @@ export interface UpdateVnicDetails {
|
|
|
59
59
|
* an empty array removes the VNIC from all network security groups.
|
|
60
60
|
* <p>
|
|
61
61
|
If the VNIC belongs to a VLAN as part of the Oracle Cloud VMware Solution (instead of
|
|
62
|
-
* belonging to a subnet), the value of the
|
|
62
|
+
* belonging to a subnet), the value of the {@code nsgIds} attribute is ignored. Instead, the
|
|
63
63
|
* VNIC belongs to the NSGs that are associated with the VLAN itself. See {@link Vlan}.
|
|
64
64
|
* <p>
|
|
65
65
|
For more information about NSGs, see
|
|
@@ -69,14 +69,14 @@ export interface UpdateVnicDetails {
|
|
|
69
69
|
"nsgIds"?: Array<string>;
|
|
70
70
|
/**
|
|
71
71
|
* Whether the source/destination check is disabled on the VNIC.
|
|
72
|
-
* Defaults to
|
|
72
|
+
* Defaults to {@code false}, which means the check is performed. For information about why you would
|
|
73
73
|
* skip the source/destination check, see
|
|
74
74
|
* [Using a Private IP as a Route Target](https://docs.cloud.oracle.com/iaas/Content/Network/Tasks/managingroutetables.htm#privateip).
|
|
75
75
|
* <p>
|
|
76
76
|
If the VNIC belongs to a VLAN as part of the Oracle Cloud VMware Solution (instead of
|
|
77
|
-
* belonging to a subnet), the value of the
|
|
77
|
+
* belonging to a subnet), the value of the {@code skipSourceDestCheck} attribute is ignored.
|
|
78
78
|
* This is because the source/destination check is always disabled for VNICs in a VLAN.
|
|
79
|
-
* Example:
|
|
79
|
+
* Example: {@code true}
|
|
80
80
|
*
|
|
81
81
|
*/
|
|
82
82
|
"skipSourceDestCheck"?: boolean;
|
|
@@ -18,7 +18,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
18
18
|
export interface UpdateVtapDetails {
|
|
19
19
|
/**
|
|
20
20
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
21
|
-
* Example:
|
|
21
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
22
22
|
*
|
|
23
23
|
*/
|
|
24
24
|
"definedTags"?: {
|
|
@@ -34,7 +34,7 @@ export interface UpdateVtapDetails {
|
|
|
34
34
|
"displayName"?: string;
|
|
35
35
|
/**
|
|
36
36
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
37
|
-
* Example:
|
|
37
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
38
38
|
*
|
|
39
39
|
*/
|
|
40
40
|
"freeformTags"?: {
|
|
@@ -71,10 +71,10 @@ export interface UpdateVtapDetails {
|
|
|
71
71
|
*/
|
|
72
72
|
"vxlanNetworkIdentifier"?: number;
|
|
73
73
|
/**
|
|
74
|
-
* Used to start or stop a
|
|
74
|
+
* Used to start or stop a {@code Vtap} resource.
|
|
75
75
|
* <p>
|
|
76
|
-
*
|
|
77
|
-
* *
|
|
76
|
+
* {@code TRUE} directs the VTAP to start mirroring traffic.
|
|
77
|
+
* * {@code FALSE} (Default) directs the VTAP to stop mirroring traffic.
|
|
78
78
|
*
|
|
79
79
|
*/
|
|
80
80
|
"isVtapEnabled"?: boolean;
|
package/lib/model/vcn.d.ts
CHANGED
|
@@ -35,7 +35,7 @@ export interface Vcn {
|
|
|
35
35
|
/**
|
|
36
36
|
* Deprecated. The first CIDR IP address from cidrBlocks.
|
|
37
37
|
* <p>
|
|
38
|
-
Example:
|
|
38
|
+
Example: {@code 172.16.0.0/16}
|
|
39
39
|
*
|
|
40
40
|
*/
|
|
41
41
|
"cidrBlock": string;
|
|
@@ -63,7 +63,7 @@ export interface Vcn {
|
|
|
63
63
|
"defaultSecurityListId"?: string;
|
|
64
64
|
/**
|
|
65
65
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
66
|
-
* Example:
|
|
66
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
67
67
|
*
|
|
68
68
|
*/
|
|
69
69
|
"definedTags"?: {
|
|
@@ -80,7 +80,7 @@ export interface Vcn {
|
|
|
80
80
|
/**
|
|
81
81
|
* A DNS label for the VCN, used in conjunction with the VNIC's hostname and
|
|
82
82
|
* subnet's DNS label to form a fully qualified domain name (FQDN) for each VNIC
|
|
83
|
-
* within this subnet (for example,
|
|
83
|
+
* within this subnet (for example, {@code bminstance1.subnet123.vcn1.oraclevcn.com}).
|
|
84
84
|
* Must be an alphanumeric string that begins with a letter.
|
|
85
85
|
* The value cannot be changed.
|
|
86
86
|
* <p>
|
|
@@ -90,13 +90,13 @@ export interface Vcn {
|
|
|
90
90
|
For more information, see
|
|
91
91
|
* [DNS in Your Virtual Cloud Network](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/dns.htm).
|
|
92
92
|
* <p>
|
|
93
|
-
Example:
|
|
93
|
+
Example: {@code vcn1}
|
|
94
94
|
*
|
|
95
95
|
*/
|
|
96
96
|
"dnsLabel"?: string;
|
|
97
97
|
/**
|
|
98
98
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
99
|
-
* Example:
|
|
99
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
100
100
|
*
|
|
101
101
|
*/
|
|
102
102
|
"freeformTags"?: {
|
|
@@ -119,18 +119,18 @@ export interface Vcn {
|
|
|
119
119
|
/**
|
|
120
120
|
* The date and time the VCN was created, in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
|
|
121
121
|
* <p>
|
|
122
|
-
Example:
|
|
122
|
+
Example: {@code 2016-08-25T21:10:29.600Z}
|
|
123
123
|
*
|
|
124
124
|
*/
|
|
125
125
|
"timeCreated"?: Date;
|
|
126
126
|
/**
|
|
127
127
|
* The VCN's domain name, which consists of the VCN's DNS label, and the
|
|
128
|
-
*
|
|
128
|
+
* {@code oraclevcn.com} domain.
|
|
129
129
|
* <p>
|
|
130
130
|
For more information, see
|
|
131
131
|
* [DNS in Your Virtual Cloud Network](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/dns.htm).
|
|
132
132
|
* <p>
|
|
133
|
-
Example:
|
|
133
|
+
Example: {@code vcn1.oraclevcn.com}
|
|
134
134
|
*
|
|
135
135
|
*/
|
|
136
136
|
"vcnDomainName"?: string;
|
|
@@ -20,14 +20,14 @@ export interface VirtualCircuitBandwidthShape {
|
|
|
20
20
|
/**
|
|
21
21
|
* The bandwidth in Mbps.
|
|
22
22
|
* <p>
|
|
23
|
-
Example:
|
|
23
|
+
Example: {@code 10000}
|
|
24
24
|
* Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
|
|
25
25
|
*/
|
|
26
26
|
"bandwidthInMbps"?: number;
|
|
27
27
|
/**
|
|
28
28
|
* The name of the bandwidth shape.
|
|
29
29
|
* <p>
|
|
30
|
-
Example:
|
|
30
|
+
Example: {@code 10 Gbps}
|
|
31
31
|
*
|
|
32
32
|
*/
|
|
33
33
|
"name": string;
|
|
@@ -20,7 +20,7 @@ export interface VirtualCircuitDrgAttachmentNetworkDetails extends model.DrgAtta
|
|
|
20
20
|
/**
|
|
21
21
|
* Boolean flag that determines wether all traffic over the virtual circuits is encrypted.
|
|
22
22
|
* <p>
|
|
23
|
-
Example:
|
|
23
|
+
Example: {@code true}
|
|
24
24
|
*
|
|
25
25
|
*/
|
|
26
26
|
"transportOnlyMode"?: boolean;
|
|
@@ -26,8 +26,8 @@ export interface VirtualCircuitPublicPrefix {
|
|
|
26
26
|
/**
|
|
27
27
|
* Oracle must verify that the customer owns the public IP prefix before traffic
|
|
28
28
|
* for that prefix can flow across the virtual circuit. Verification can take a
|
|
29
|
-
* few business days.
|
|
30
|
-
* means verification succeeded.
|
|
29
|
+
* few business days. {@code IN_PROGRESS} means Oracle is verifying the prefix. {@code COMPLETED}
|
|
30
|
+
* means verification succeeded. {@code FAILED} means verification failed and traffic for
|
|
31
31
|
* this prefix will not flow across the connection.
|
|
32
32
|
*
|
|
33
33
|
*/
|